Research Article

A Novel Security Authentication Protocol Based on Physical Unclonable Function for RFID Healthcare Systems

Table 3

Comparisons of different protocols’ security.

Attack methodsC-RAPA protocolChou protocol [26]Liao protocol [27]Xie protocol [32]

Counterfeiting attack××
Replay attack
Replication attack
Forward privacy attack×
Desynchronization attack
Tag-tracking attack××